CN113538824A - Control method, device and system of electronic fence, electronic device and storage medium - Google Patents

Control method, device and system of electronic fence, electronic device and storage medium Download PDF

Info

Publication number
CN113538824A
CN113538824A CN202110618232.3A CN202110618232A CN113538824A CN 113538824 A CN113538824 A CN 113538824A CN 202110618232 A CN202110618232 A CN 202110618232A CN 113538824 A CN113538824 A CN 113538824A
Authority
CN
China
Prior art keywords
mobile terminal
electronic fence
server
alarm
position information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110618232.3A
Other languages
Chinese (zh)
Inventor
方志华
朱龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Huacheng Software Technology Co Ltd
Original Assignee
Hangzhou Huacheng Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Huacheng Software Technology Co Ltd filed Critical Hangzhou Huacheng Software Technology Co Ltd
Priority to CN202110618232.3A priority Critical patent/CN113538824A/en
Publication of CN113538824A publication Critical patent/CN113538824A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters

Abstract

The application relates to a control method, a device, a system, an electronic device and a storage medium of an electronic fence, wherein the control method of the electronic fence comprises the following steps: sending first position information of the electronic fence preset by a user and second position information of the mobile terminal to a server; under the condition that the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information, detecting a suspicious target according to video information acquired by the mobile terminal in the electronic fence; and sending an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to perform physical alarm. By the method and the device, the problem of low control safety of the electronic fence is solved, and the control method with the electronic fence function on the mobile terminal is realized.

Description

Control method, device and system of electronic fence, electronic device and storage medium
Technical Field
The present application relates to the field of electronic fence technologies, and in particular, to a method, an apparatus, a system, an electronic apparatus, and a storage medium for controlling an electronic fence.
Background
The electronic fence is based on a physical purse net and a fence, utilizes advanced internet of things sensing and detecting technology and equipment to establish an anti-intrusion electronic fence on the periphery of a protected object, detects and deters illegal behaviors such as crossing, damage, theft, occupation pressure and the like, and is linked with a video monitoring system to review and obtain evidence, so that the functions of discovering, delaying intrusion and obtaining evidence afterwards are achieved. In the related art, the electronic fence function of the mobile terminal is usually not configurable, and cannot be controlled in a targeted manner in time and effectively when the user of the mobile terminal enters and leaves the electronic fence, which results in low security of controlling the electronic fence on the mobile terminal.
At present, no effective solution is provided for the problem of low control safety of the electronic fence in the related art.
Disclosure of Invention
The embodiment of the application provides a control method, a control device, a control system, an electronic device and a storage medium of an electronic fence, so as to at least solve the problem of low control safety of the electronic fence in the related art.
In a first aspect, an embodiment of the present application provides a method for controlling an electronic fence, where the method includes:
sending first position information of the electronic fence preset by a user and second position information of the mobile terminal to a server;
under the condition that the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information, detecting a suspicious target according to video information acquired by the mobile terminal in the electronic fence;
and sending an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to perform physical alarm.
In a possible embodiment, the detecting a suspicious object according to the video recording information acquired by the mobile terminal in the electronic fence includes:
pushing the video information through an application program of the mobile terminal, and detecting the suspicious target according to the video information; alternatively, the first and second electrodes may be,
sending the video information to the server; the server is used for acquiring a plurality of frames of human figures according to the video information by using a frame extraction algorithm;
and generating an alarm dynamic image according to the received multi-frame human figure image of the server through an application program of the mobile terminal, and detecting the suspicious target according to the alarm dynamic image.
In a possible embodiment, in a case that the server detects that the mobile terminal is located in the electronic fence according to the first location information and the second location information, the method further includes:
acquiring reminding service information through an application program, and detecting the suspicious target according to the reminding service information;
and sending the alarm instruction to carry out telephone alarm under the condition that the suspicious target is detected.
In a possible embodiment, after the first location information of the electronic fence preset by the user and the second location information of the mobile terminal are sent to the server, the method further includes:
when the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information, sending an opening instruction to intelligent equipment to control the intelligent equipment to be opened;
and sending a closing instruction to the intelligent equipment to control the intelligent equipment to be closed under the condition that the server detects that the mobile terminal is positioned outside the electronic fence according to the first position information and the second position information.
In a possible embodiment, the sending, to the server, first location information of the electronic fence preset by the user and second location information of the mobile terminal includes:
receiving at least one electronic fence selection set by a user on a map;
and sending the corresponding first position information to the server according to the electronic fence selection, and sending the second position information to the server.
In a possible embodiment, before the sending the first location information of the electronic fence preset by the user and the second location information of the mobile terminal to the server, the method further includes:
and acquiring the starting time period and the mode information of the electronic fence preset by the user.
In a second aspect, an embodiment of the present application provides a method for controlling an electronic fence, where the method includes:
the server receives first position information of the electronic fence preset by a user on the mobile terminal and receives second position information of the mobile terminal; wherein the first location information comprises center coordinates and a radius of the electronic fence;
the server calculates the distance between the mobile terminal and the electronic fence according to the center coordinate and the second position information, and detects whether the mobile terminal is located in the electronic fence according to the distance and the radius;
under the condition that the mobile terminal is located in the electronic fence, detecting a suspicious target according to video information acquired by the mobile terminal in the electronic fence;
and the mobile terminal sends an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to perform physical alarm.
In a third aspect, an embodiment of the present application provides a control apparatus for an electronic fence, the apparatus including: the device comprises a sending module, a detection module and a control module;
the sending module is used for sending first position information of the electronic fence preset by a user and second position information of the mobile terminal to a server;
the detection module is configured to detect a suspicious target according to the video information acquired by the mobile terminal in the electronic fence when the server detects that the mobile terminal is located in the electronic fence according to the first location information and the second location information;
and the control module is used for sending an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to carry out physical alarm.
In a fourth aspect, an embodiment of the present application provides a control system for an electronic fence, the system including: the system comprises a mobile terminal, a server and an alarm module;
the mobile terminal sends first position information of the electronic fence preset by a user and second position information of the mobile terminal to a server;
the mobile terminal detects a suspicious target according to the video information acquired by the mobile terminal in the electronic fence under the condition that the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information;
and the mobile terminal sends an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to perform physical alarm.
In a fifth aspect, an embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor, when executing the computer program, implements the control method of the electronic fence according to the first aspect and the second aspect.
In a sixth aspect, the present application provides a storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the control method for the electronic fence according to the first and second aspects.
Compared with the related art, the control method, the control device, the control system, the electronic device and the storage medium of the electronic fence provided by the embodiment of the application send the first position information of the electronic fence preset by a user and the second position information of the mobile terminal to the server; under the condition that the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information, detecting a suspicious target according to video information acquired by the mobile terminal in the electronic fence; and sending an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to perform physical alarm, thereby solving the problem of low control safety of the electronic fence and realizing the control method with the electronic fence function on the mobile terminal.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic diagram of an application environment of a control method of an electronic fence according to an embodiment of the present application;
fig. 2 is a flowchart of a control method of an electronic fence according to an embodiment of the present application;
FIG. 3 is a schematic view of an electronic fence selection in accordance with an embodiment of the present application;
fig. 4 is a flowchart of another control method of an electronic fence according to an embodiment of the present application;
fig. 5 is a schematic diagram of a control architecture of an electronic fence according to a preferred embodiment of the present application;
fig. 6 is a flowchart of a control method of an electronic fence according to a preferred embodiment of the present application;
fig. 7 is a block diagram of a control device of an electronic fence according to an embodiment of the present application;
fig. 8 is a block diagram of a control system of an electronic fence according to an embodiment of the present application;
fig. 9 is a block diagram of the inside of a computer device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference herein to "a plurality" means greater than or equal to two. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The control method of the electronic fence provided by the application can be applied to the application environment shown in fig. 1. Wherein the mobile terminal 102 communicates with the server 104 over a network. The mobile terminal 102 sends first position information of the electronic fence and second position information of the mobile terminal 102 to the server 104, and if the server 104 detects that the mobile terminal 102 is located in the electronic fence according to the first position information and the second position information, the mobile terminal detects a suspicious target and sends an alarm instruction to an alarm module connected with the mobile terminal 102 so as to control the alarm module to perform physical alarm. The mobile terminal 102 may be, but not limited to, various smart phones, laptops, tablets, portable wearable devices, and handheld devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
The present embodiment provides a control method of an electronic fence, and fig. 2 is a flowchart of a control method of an electronic fence according to an embodiment of the present application, and as shown in fig. 2, the flowchart includes the following steps:
step S202, sending the first position information of the electronic fence preset by the user and the second position information of the mobile terminal to a server. The user can select the electronic fence to be set on the map page of the mobile terminal; the mobile terminal sends the first position information of the selected electronic fence to the server, and sends the second position information of the mobile terminal to the server.
Step S204, when the server detects that the mobile terminal is located in the electronic fence according to the first location information and the second location information, detecting a suspicious target according to the video information acquired by the mobile terminal in the electronic fence. And the server calculates the relative position between the mobile terminal and the electronic fence according to the received first position information and the second position information, and detects whether the mobile terminal is positioned in the selection range of the electronic fence according to the calculation result. And if the mobile terminal is detected to be positioned in the electronic fence, triggering a camera device connected with the mobile terminal to perform linkage alarm. At the moment, the camera device uploads the video information obtained by shooting to the mobile terminal, and the mobile terminal detects the suspicious target according to the video information.
And step S206, sending an alarm instruction to an alarm module connected with the mobile terminal under the condition that the suspicious target is detected so as to control the alarm module to perform physical alarm. If the mobile terminal detects a suspicious target, an alarm instruction is sent to a camera device connected with the mobile terminal, and the camera device is linked with an alarm module connected with the camera device to perform physical alarm so as to provide deterrence for lawbreakers; the alarm module can be an alarm and other devices.
Through the steps S202 to S206, the first position information of the electronic fence is sent to the server, and when the server detects that the mobile terminal is located in the electronic fence according to the first position information, the suspicious target is detected according to the received video information, and if the suspicious target is detected, an alarm instruction is sent to the alarm module to control the alarm module to perform physical alarm, so that the judgment and control based on the electronic fence are more accurate and timely, and the alarm module is controlled to perform corresponding operations based on the detection result of the server, thereby solving the problem of low control security of the electronic fence, and realizing the control method with the electronic fence function on the mobile terminal.
In a possible embodiment, the step S204 further includes: and under the condition that the server detects that the mobile terminal is positioned in the electronic fence according to the first position information and the second position information, pushing the video recording information through an application program of the mobile terminal, and detecting the suspicious target according to the video recording information. If the mobile terminal is detected to be located in the electronic fence, the application program pushes the video information, and a user can timely know the situation through the video information and check whether the mobile terminal is a suspicious target. If the suspicious target is detected not to be the suspicious target, remote door opening control and other operations can be carried out; if the suspicious object is detected, an alarm instruction can be sent to an alarm module linked with the mobile terminal to perform physical alarm, or property and an alarm call can be dialed by one key of the mobile terminal.
Through the embodiment, the video information is pushed through the application program and the suspicious target is detected under the condition that the mobile terminal is located in the electronic fence, so that the application program is pushed to give an alarm, the alarm mode is enriched, a user can timely know the condition through the video information, and the safety of electronic fence control is effectively improved.
In a possible embodiment, in a case that the server detects that the mobile terminal is located in the electronic fence according to the first location information and the second location information, the method for controlling the electronic fence further includes the following steps:
step S302, sending the video information to the server; the server is used for acquiring the multi-frame human figure according to the video information by using a frame extraction algorithm. Specifically, taking the multi-frame human map as 5 frames of pictures, and generating the alarm motion picture based on the 5 frames of pictures as an example, the server extracts a first I frame from the received video, and judges whether the I frame has a human shape. If the I frame has no human shape, continuously extracting the next I frame until the extracted I frame is determined to have the human shape; if yes, the I frame is taken as a video cover, other 4 human-shaped pictures are obtained, and the 5 pictures are stored in sequence. It should be noted that, in the embodiment of the present application, an I frame indicates a key frame, and refers to a completely reserved frame in a video.
And step S304, generating an alarm moving picture according to the received multi-frame human figure of the server through the application program of the mobile terminal and pushing the alarm moving picture. The application program obtains a plurality of frames of human figures and forms the alarm motion picture in gif format by the plurality of frames of human figures. Therefore, the application program can alarm information in the case that the mobile terminal is detected to be in the electronic fence, and the alarm information can comprise alarm motion picture and video information.
Step S306, under the condition that the suspicious object is detected according to the alarm moving picture, the alarm instruction is sent to the alarm module. The user can check the alarm image by one key in the application program of the mobile terminal to detect whether a suspicious object exists.
Through the steps S302 to S306, the alarm moving picture is generated according to the received multiframe human figure of the server through the application program to carry out pushing alarm, so that a user can timely acquire key human figure generation information, alarm information can be played only by loading the alarm moving picture, the situation that when alarm pushing occurs, the situation that the video cannot be checked in time when the user clicks to check the video due to the fact that the video is not produced is avoided, and meanwhile, even after the video generation is finished, the phenomenon that the video can be played only after the video is downloaded needs to be loaded is avoided, and therefore the accuracy and the safety of electronic fence control are effectively improved.
In a possible embodiment, in a case that the server detects that the mobile terminal is located in the electronic fence according to the first location information and the second location information, the method for controlling the electronic fence further includes the following steps: acquiring reminding service information through an application program, and detecting the suspicious target according to the reminding service information; and sending the alarm instruction to carry out telephone alarm in the case of detecting the suspicious target.
Specifically, first, the user can set up or purchase a phone alert service on an application; when the mobile terminal is detected to be located in the electronic fence, an alarm is triggered, at the moment, the reminding service information of the call reminding is obtained through the application program, a user is prompted to send an alarm by your equipment, the application program is opened as soon as possible for checking, meanwhile, the user can check whether the mobile terminal is a suspicious target, and if the mobile terminal is detected to be located in the electronic fence, the user can make a police call by one key.
Through the embodiment, whether suspicious targets exist or not is detected through the reminding service information, and the property and the alarm telephone are dialed by one key when the suspicious targets are found, so that the electronic fence can be timely notified when emergencies such as suspicious target intrusion and the like occur in the control process of the electronic fence, and the control safety of the electronic fence is further improved. Meanwhile, in the embodiment of the application, the alarm is performed through different alarm modes such as physical equipment alarm, application program push alarm, telephone reminding alarm and the like, various alarm configuration choices can be realized, and the control function of the electronic fence is enriched.
In a possible embodiment, after the step S202 is executed, the method for controlling an electronic fence further includes the following steps: when the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information, sending an opening instruction to the intelligent device to control the intelligent device to be opened; and sending a closing instruction to the intelligent equipment to control the intelligent equipment to be closed under the condition that the server detects that the mobile terminal is positioned outside the electronic fence according to the first position information and the second position information.
Specifically, when the mobile terminal is detected to enter or leave the electronic fence, a corresponding action of the intelligent device can be triggered; for example, if the mobile terminal is in the electronic fence, that is, the mobile terminal enters the electronic fence, the intelligent devices such as a street lamp camera, an intelligent air conditioner and an intelligent fan are turned on; and if the mobile terminal leaves the electronic fence, closing each intelligent device. It should be noted that, the user may also set the intelligent device that needs to be associated in the electronic fence on the mobile terminal in advance, for example, only the intelligent air conditioner in the electronic fence is associated, and the intelligent fan is not associated.
Through the embodiment, when the mobile terminal enters or leaves the electronic fence, the associated intelligent equipment is triggered in a linkage mode, so that the intelligent feedback function for controlling the electronic fence is richer, and the user experience is effectively improved.
In a possible embodiment, the step S202 further includes the following steps: receiving at least one electronic fence selection set by a user on a map; and sending the corresponding first position information to the server according to the electronic fence selection, and sending the second position information to the server. Fig. 3 is a schematic diagram of an electronic fence selection according to an embodiment of the present application, and as shown in fig. 3, a user may select a plurality of electronic fences with different ranges or shapes on a map. After clicking and saving, the mobile terminal uploads the central coordinates and the radius of the electronic fences and second position information such as longitude and latitude of the mobile terminal to a server for storage.
Through the embodiment, at least one electronic fence circle set by a user on the map is received, the corresponding first position information is sent to the server according to the electronic fence circle, and the second position information is sent to the server, so that the user-defined circle area in the map is supported, a multi-area electronic fence can be set, and a plurality of area electronic fence scenes are guaranteed.
In a possible embodiment, before the step S202, the method for controlling an electronic fence further includes the steps of: and acquiring the starting time period and the mode information of the electronic fence preset by the user. The user can set the enabled time period of the electronic fence on the application program of the mobile terminal, which is specifically as follows: displaying a list of enabled time periods for the electronic fence over a period of time, e.g., a week; the user clicks a time period setting page for entering the application program and sets different mode information; the mode information includes: the user can select a corresponding mode to set according to the actual condition of the user.
Through the embodiment, the electronic fence with various strategies is set through the mobile terminal by acquiring the starting time period and the mode information of the electronic fence preset by the user, so that the setting function in the electronic fence control is more diversified.
The present embodiment further provides a control method of an electronic fence, and fig. 4 is a flowchart of another control method of an electronic fence according to an embodiment of the present application, and as shown in fig. 4, the flowchart includes the following steps:
step S402, a server receives first position information of the electronic fence preset by a user on a mobile terminal and receives second position information of the mobile terminal; the first position information comprises a center coordinate and a radius of the electronic fence, and the center coordinate refers to a longitude and latitude coordinate of a center point of the electronic fence; the second location information includes latitude and longitude coordinates of the mobile terminal.
Step S404, the server calculates a distance between the mobile terminal and the electronic fence according to the center coordinate and the second location information, and detects whether the mobile terminal is located in the electronic fence according to the distance and the radius.
Specifically, the distance between the mobile terminal and the longitude and latitude coordinates of the center point of the electronic fence is calculated through the center coordinates and the second position information. One of the distance calculations is implemented as follows:
/**
the @ Description is to calculate the distance between the mobile terminal and the longitude and latitude coordinates of the central point of the electronic fence
Longitude of mobile terminal @ param lat1
Latitude of mobile terminal @ param lng1
(xvr @ param lat2 center point longitude
Lat center point latitude of @ param lng2 electronic fence
*@return int
*/
public static int distanceOfTwoPoints(double lat1,double lng1,double lat2,double lng2){
double radLat1=radian(lat1);
double radLat2=radian(lat2);
double a=radLat1-radLat2;
double b=radian(lng1)-radian(lng2);
double s=2*Math.asin(Math.sqrt(Math.pow(Math.sin(a/2),2)
+Math.cos(radLat1)*Math.cos(radLat2)*Math.pow(Math.sin(b/2),2)));
s=s*EARTH_RADIUS;
s=Math.round(s*10000)/10000;
return s;
}
Then comparing the obtained distance s with the radius R of the electronic fence, and judging that M is s-R; if M > is 0, the mobile terminal is outside the electronic fence; if M <0, it means that the mobile terminal is inside the electronic fence.
Step S406, under the condition that the mobile terminal is positioned in the electronic fence, detecting a suspicious target according to the video information acquired by the mobile terminal in the electronic fence; and the mobile terminal sends an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to perform physical alarm.
Through the steps S402 to S406, whether the mobile terminal is located in the electronic fence is detected based on the calculation result of the distance between the mobile terminal and the electronic fence, and then a corresponding alarm operation is performed, so that the position of the mobile terminal is more accurately determined, and the accuracy of controlling the electronic fence is further improved.
An embodiment of the present invention is described in detail below with reference to an actual application scenario, and fig. 5 is a schematic diagram of a control architecture of an electronic fence according to a preferred embodiment of the present application, and as shown in fig. 5, the architecture includes an intelligent platform built based on a server, a mobile terminal, and an intelligent feedback system.
The intelligent platform is mainly used for storing information such as longitude and latitude, range and the like of the electronic fence. The mobile terminal comprises a map module, a setting module, a display module and an intelligent feedback module. The map module is used for displaying a map in a preset scale, such as a 16-time magnification scale, on a map page, and can set an electronic fence on the map and add intelligent equipment into the electronic fence; the setting module is mainly used for setting electronic fence selection, electronic fence starting strategies, a plurality of electronic fence areas and the like; the display module is used for acquiring information of the electronic fence and the associated intelligent equipment from the intelligent platform and displaying the information on a map; the intelligent feedback module is mainly used for sending an intelligent instruction to the intelligent feedback alarm system when the handheld device enters or leaves the electronic fence so as to trigger related intelligent devices in a linkage manner. The intelligent feedback alarm system comprises a plurality of intelligent devices, such as an intelligent device A and an intelligent device B, and an alarm module; the intelligent feedback alarm system is used for triggering the intelligent devices in a linkage manner and triggering the alarm module to give an alarm when the handheld device enters or leaves the electronic fence.
Fig. 6 is a flowchart of a control method of an electronic fence according to a preferred embodiment of the present application, as shown in fig. 6, the flowchart includes the following steps:
step S602, the mobile terminal enters a map page, and an electronic fence is arranged on the map.
Step S604, setting an enabling strategy of the electronic fence. Wherein, the user can set the starting time period of the electronic fence and set the unused starting mode through an application program on the mobile terminal.
And step S606, adding intelligent equipment in the electronic fence and storing.
Step S608, the intelligent platform stores the longitude and latitude and the radius of the center point of the electronic fence, the starting strategy and the related intelligent equipment information.
And step S610, judging whether the longitude and latitude of the mobile terminal enters the range of the electronic fence or not.
And step S612, triggering the intelligent feedback alarm system. Wherein, this intelligence feedback is reported to the police and is included a plurality of smart machines and alarm module.
It should be noted that the steps illustrated in the above-described flow diagrams or in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that, although a logical order is illustrated in the flow diagrams, in some cases, the steps illustrated or described may be performed in an order different than here.
The present embodiment further provides a control device for an electronic fence, which is used to implement the foregoing embodiments and preferred embodiments, and the description of the device is omitted here. As used hereinafter, the terms "module," "unit," "subunit," and the like may implement a combination of software and/or hardware for a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 7 is a block diagram of a control device of an electronic fence according to an embodiment of the present application, as shown in fig. 7, the device includes: a sending module 72, a detection module 74, and a control module 76; the sending module 72 is configured to send first location information of the electronic fence preset by a user and second location information of the mobile terminal to the server; the detecting module 74 is configured to detect a suspicious target according to the video information obtained by the mobile terminal in the electronic fence when the server detects that the mobile terminal is located in the electronic fence according to the first location information and the second location information; the control module 76 is configured to send an alarm instruction to an alarm module connected to the mobile terminal to control the alarm module to perform a physical alarm when the suspicious object is detected.
Through the embodiment, the sending module 72 sends the first position information of the electronic fence to the server, the detecting module 74 detects a suspicious target according to the received video information when the server detects that the mobile terminal is located in the electronic fence according to the first position information, and if the suspicious target is detected, the control module 76 sends an alarm instruction to the alarm module to control the alarm module to perform physical alarm, so that the judgment and control based on the electronic fence are more accurate and timely, and the alarm module is controlled to perform corresponding operations based on the detection result of the server, thereby solving the problem of low control security of the electronic fence, and realizing the control method with the electronic fence function on the mobile terminal.
In one possible embodiment, the detection module 74 is further configured to push the video information through an application of the mobile terminal, and detect the suspicious object according to the video information. Or, the detecting module 74 sends the video information to the server; the server is used for acquiring a plurality of frames of human figures according to the video information by using a frame extraction algorithm; the detection module 74 generates an alarm moving picture according to the received multi-frame human figure of the server through an application program of the mobile terminal, and detects the suspicious target according to the alarm moving picture.
In one possible embodiment, the detection module 74 is further configured to obtain an alert service message through an application program, and detect the suspicious object according to the alert service message; the control module 76 is also operable to send the alert command to effect a telephone alert in the event that the suspect target is detected.
In a possible embodiment, the control module 76 is further configured to send an open instruction to the smart device to control the smart device to open if the server detects that the mobile terminal is located in the electronic fence according to the first location information and the second location information; the control module 76 sends a closing instruction to the intelligent device to control the intelligent device to close when the server detects that the mobile terminal is located outside the electronic fence according to the first location information and the second location information.
In a possible embodiment, the sending module 72 is further configured to receive at least one electronic fence selection set by the user on the map; the sending module sends the corresponding first position information to the server according to the electronic fence selection, and sends the second position information to the server.
In a possible embodiment, the control device of the electronic fence further comprises an acquisition module; the obtaining module is configured to obtain a starting time period and mode information of the electronic fence preset by the user.
The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
The present embodiment further provides a control system of an electronic fence, and fig. 8 is a block diagram of a control system of an electronic fence according to an embodiment of the present application, and as shown in fig. 8, the system includes: mobile terminal 102, server 104 and alarm module 82; the mobile terminal 102 sends first position information of the electronic fence preset by a user and second position information of the mobile terminal 102 to the server 104; when the server 104 detects that the mobile terminal 102 is located in the electronic fence according to the first location information and the second location information, the mobile terminal 102 detects a suspicious target according to the video information acquired by the mobile terminal 102 in the electronic fence; the mobile terminal 102 sends an alarm instruction to the alarm module 82 connected to the mobile terminal 102 when detecting the suspicious object, so as to control the alarm module 82 to perform a physical alarm.
Through the embodiment, the mobile terminal 102 sends the first position information of the electronic fence to the server 104, detects the suspicious object according to the received video information when the server 104 detects that the mobile terminal 102 is located in the electronic fence according to the first position information, and sends the alarm instruction to the alarm module 82 to control the alarm module 82 to perform physical alarm when the mobile terminal 102 detects the suspicious object, so that judgment and control based on the electronic fence are more accurate and timely, and the alarm module 82 is controlled to perform corresponding operations based on the detection result of the server 104, thereby solving the problem of low control security of the electronic fence, and realizing the control method with the electronic fence function on the mobile terminal 102.
In a possible embodiment, the mobile terminal 102 is further configured to push the video information through an application program of the mobile terminal 102, and detect the suspicious object according to the video information. Or, the mobile terminal 102 sends the video information to the server 104; the server 104 is configured to obtain multiple frames of human figures according to the video information by using a frame extraction algorithm; the mobile terminal 102 generates and pushes an alarm moving picture according to the received multiple frames of the human figures of the server 104 through the application program; the mobile terminal 102 sends the alarm command to the alarm module 82 when the suspicious object is detected according to the alarm map.
In a possible embodiment, the mobile terminal 102 is further configured to obtain a reminding service message through an application program, and detect the suspicious object according to the reminding service message; the mobile terminal 102 sends the alert instruction to alert the phone if the suspicious object is detected.
In one possible embodiment, the control system of the electronic fence further comprises a smart device; the mobile terminal 102 is further configured to send an open instruction to the smart device to control the smart device to open when the server 104 detects that the mobile terminal 102 is located in the electronic fence according to the first location information and the second location information; the mobile terminal 102 sends a closing instruction to the intelligent device to control the intelligent device to close when the server 104 detects that the mobile terminal 102 is located outside the electronic fence according to the first location information and the second location information.
In a possible embodiment, the mobile terminal 102 is further configured to receive at least one electronic fence selection set by a user on a map; the mobile terminal 102 sends the corresponding first location information to the server 104 according to the electronic fence selection, and sends the second location information to the server 104.
In a possible embodiment, the mobile terminal 102 is further configured to obtain the activation time period and mode information of the electronic fence preset by the user.
In some embodiments, a computer device is provided, and the computer device may be a server, and fig. 9 is a structural diagram of the inside of a computer device according to the embodiment of the present application, as shown in fig. 9. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing the first location information. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a control method of an electronic fence.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The present embodiment also provides an electronic device comprising a memory having a computer program stored therein and a processor configured to execute the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
and S1, sending the first position information of the electronic fence preset by the user and the second position information of the mobile terminal to a server.
And S2, detecting a suspicious object according to the video information acquired by the mobile terminal in the electronic fence under the condition that the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information.
And S3, sending an alarm instruction to an alarm module connected with the mobile terminal to control the alarm module to perform physical alarm under the condition that the suspicious target is detected.
It should be noted that, for specific examples in this embodiment, reference may be made to examples described in the foregoing embodiments and optional implementations, and details of this embodiment are not described herein again.
In addition, in combination with the control method of the electronic fence in the above embodiments, the embodiments of the present application may provide a storage medium to implement. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements the control method of the electronic fence of any of the above embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It should be understood by those skilled in the art that various features of the above-described embodiments can be combined in any combination, and for the sake of brevity, all possible combinations of features in the above-described embodiments are not described in detail, but rather, all combinations of features which are not inconsistent with each other should be construed as being within the scope of the present disclosure.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (11)

1. A control method of an electronic fence, the method comprising:
sending first position information of the electronic fence preset by a user and second position information of the mobile terminal to a server;
under the condition that the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information, detecting a suspicious target according to video information acquired by the mobile terminal in the electronic fence;
and sending an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to perform physical alarm.
2. The method according to claim 1, wherein the detecting suspicious objects according to the video recording information obtained by the mobile terminal in the electronic fence comprises:
pushing the video information through an application program of the mobile terminal, and detecting the suspicious target according to the video information; alternatively, the first and second electrodes may be,
sending the video information to the server; the server is used for acquiring a plurality of frames of human figures according to the video information by using a frame extraction algorithm;
and generating an alarm dynamic image according to the received multi-frame human figure image of the server through an application program of the mobile terminal, and detecting the suspicious target according to the alarm dynamic image.
3. The method according to claim 1, wherein in a case where the server detects that the mobile terminal is located in the electronic fence according to the first location information and the second location information, the method further comprises:
acquiring reminding service information through an application program, and detecting the suspicious target according to the reminding service information;
and sending the alarm instruction to carry out telephone alarm under the condition that the suspicious target is detected.
4. The method according to claim 1, wherein after the first location information of the electronic fence preset by the user and the second location information of the mobile terminal are sent to the server, the method further comprises:
when the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information, sending an opening instruction to intelligent equipment to control the intelligent equipment to be opened;
and sending a closing instruction to the intelligent equipment to control the intelligent equipment to be closed under the condition that the server detects that the mobile terminal is positioned outside the electronic fence according to the first position information and the second position information.
5. The method according to claim 1, wherein the sending, to the server, first location information of the electronic fence preset by the user and second location information of the mobile terminal comprises:
receiving at least one electronic fence selection set by a user on a map;
and sending the corresponding first position information to the server according to the electronic fence selection, and sending the second position information to the server.
6. The method according to any one of claims 1 to 5, wherein before the sending the first location information of the electronic fence and the second location information of the mobile terminal, which are preset by the user, to the server, the method further comprises:
and acquiring the starting time period and the mode information of the electronic fence preset by the user.
7. A control method of an electronic fence, the method comprising:
the server receives first position information of the electronic fence preset by a user on the mobile terminal and receives second position information of the mobile terminal; wherein the first location information comprises center coordinates and a radius of the electronic fence;
the server calculates the distance between the mobile terminal and the electronic fence according to the center coordinate and the second position information, and detects whether the mobile terminal is located in the electronic fence according to the distance and the radius;
under the condition that the mobile terminal is located in the electronic fence, detecting a suspicious target according to video information acquired by the mobile terminal in the electronic fence;
and the mobile terminal sends an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to perform physical alarm.
8. A control apparatus for an electronic fence, the apparatus comprising: the device comprises a sending module, a detection module and a control module;
the sending module is used for sending first position information of the electronic fence preset by a user and second position information of the mobile terminal to a server;
the detection module is configured to detect a suspicious target according to the video information acquired by the mobile terminal in the electronic fence when the server detects that the mobile terminal is located in the electronic fence according to the first location information and the second location information;
and the control module is used for sending an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to carry out physical alarm.
9. A control system for an electronic fence, the system comprising: the system comprises a mobile terminal, a server and an alarm module;
the mobile terminal sends first position information of the electronic fence preset by a user and second position information of the mobile terminal to a server;
the mobile terminal detects a suspicious target according to the video information acquired by the mobile terminal in the electronic fence under the condition that the server detects that the mobile terminal is located in the electronic fence according to the first position information and the second position information;
and the mobile terminal sends an alarm instruction to an alarm module connected with the mobile terminal under the condition of detecting the suspicious target so as to control the alarm module to perform physical alarm.
10. An electronic device comprising a memory and a processor, wherein the memory stores a computer program, and the processor is configured to run the computer program to perform the control method of the electronic fence according to any one of claims 1 to 7.
11. A storage medium having a computer program stored thereon, wherein the computer program is configured to execute the control method of the electronic fence according to any one of claims 1 to 7 when running.
CN202110618232.3A 2021-05-31 2021-05-31 Control method, device and system of electronic fence, electronic device and storage medium Pending CN113538824A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110618232.3A CN113538824A (en) 2021-05-31 2021-05-31 Control method, device and system of electronic fence, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110618232.3A CN113538824A (en) 2021-05-31 2021-05-31 Control method, device and system of electronic fence, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN113538824A true CN113538824A (en) 2021-10-22

Family

ID=78095095

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110618232.3A Pending CN113538824A (en) 2021-05-31 2021-05-31 Control method, device and system of electronic fence, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN113538824A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114283583A (en) * 2021-12-28 2022-04-05 阿波罗智联(北京)科技有限公司 Method for vehicle-road cooperation, vehicle-mounted intelligent terminal, cloud control platform and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635960A (en) * 2014-11-19 2016-06-01 中兴通讯股份有限公司 Terminal management method, terminal management apparatus and terminal management system
CN106294724A (en) * 2016-08-09 2017-01-04 浙江宇视科技有限公司 A kind of night watching track acquisition methods and device
US20180239953A1 (en) * 2015-08-19 2018-08-23 Technomirai Co., Ltd. Smart-security digital system, method and program
CN111131783A (en) * 2019-12-27 2020-05-08 泰斗微电子科技有限公司 Monitoring method and device based on electronic fence, terminal equipment and storage medium
CN111479215A (en) * 2020-03-04 2020-07-31 视联动力信息技术股份有限公司 Position information processing method and device, electronic equipment and storage medium
CN111787485A (en) * 2020-06-02 2020-10-16 Oppo广东移动通信有限公司 Electronic fence creating method and device and storage medium
CN111899467A (en) * 2020-07-16 2020-11-06 深圳鞠慈云科技有限公司 Early warning system and method for accidental loss
CN112732990A (en) * 2021-01-12 2021-04-30 深圳广联赛讯股份有限公司 Electronic fence retrieval method, device, equipment and computer readable storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635960A (en) * 2014-11-19 2016-06-01 中兴通讯股份有限公司 Terminal management method, terminal management apparatus and terminal management system
US20180239953A1 (en) * 2015-08-19 2018-08-23 Technomirai Co., Ltd. Smart-security digital system, method and program
CN106294724A (en) * 2016-08-09 2017-01-04 浙江宇视科技有限公司 A kind of night watching track acquisition methods and device
CN111131783A (en) * 2019-12-27 2020-05-08 泰斗微电子科技有限公司 Monitoring method and device based on electronic fence, terminal equipment and storage medium
CN111479215A (en) * 2020-03-04 2020-07-31 视联动力信息技术股份有限公司 Position information processing method and device, electronic equipment and storage medium
CN111787485A (en) * 2020-06-02 2020-10-16 Oppo广东移动通信有限公司 Electronic fence creating method and device and storage medium
CN111899467A (en) * 2020-07-16 2020-11-06 深圳鞠慈云科技有限公司 Early warning system and method for accidental loss
CN112732990A (en) * 2021-01-12 2021-04-30 深圳广联赛讯股份有限公司 Electronic fence retrieval method, device, equipment and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114283583A (en) * 2021-12-28 2022-04-05 阿波罗智联(北京)科技有限公司 Method for vehicle-road cooperation, vehicle-mounted intelligent terminal, cloud control platform and system
CN114283583B (en) * 2021-12-28 2023-08-29 阿波罗智联(北京)科技有限公司 Method for vehicle-road coordination, vehicle-mounted intelligent terminal, cloud control platform and system

Similar Documents

Publication Publication Date Title
EP2115953B1 (en) Apparatus and methods for locating, tracking and/or recovering a wireless communication device
KR102543623B1 (en) Mobile security countermeasures
EP2998945B1 (en) System for auto-configuration of devices in a building information model using bluetooth low energy
US20100273452A1 (en) Apparatus and Methods For Locating Tracking and/or Recovering a Wireless Communication Device
CN110245630A (en) Monitoring data processing method, device and readable storage medium storing program for executing
CN109872482A (en) Wisdom security protection monitoring and managing method, system and storage medium
CN109219036A (en) Unbind method and device, the electronic equipment of equipment
CN108551550A (en) Image control, the filming control method of camera applications, device and electronic equipment
Vaijnath et al. Smart safty Device for Women
CN109951476A (en) Attack Prediction method, apparatus and storage medium based on timing
CN110149599A (en) A kind of short message means of defence and terminal device
CN110944014A (en) Terminal data security active defense method and device
CN113538824A (en) Control method, device and system of electronic fence, electronic device and storage medium
CN112614165A (en) Smoke and fire monitoring method and device, camera, electronic device and storage medium
CN109697815A (en) Anti-theft communication network alarming method, appliance arrangement and storage medium
CN112347306A (en) PTZ camera monitoring and tracking method, device and system and computer equipment
CN109040469A (en) Call processing method, mobile terminal and computer readable storage medium
WO2020114112A1 (en) Block chain-based smart alarm method and apparatus, and electronic device
TW201843662A (en) Emergency call detection system
CN107564214A (en) Door window antitheft method, apparatus and system
CN108664216B (en) Data storage method and device
CN110557722B (en) Target group partner identification method and related device
CN109637079A (en) A kind of child custody method and system based on cloud computing
CN110598670B (en) Method and device for setting monitoring area forbidden zone, storage medium and computer equipment
JP2019086904A (en) Image management server and image management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination